نتایج جستجو برای: hypercyclically embedded

تعداد نتایج: 109535  

Journal: :journal of agricultural science and technology 2015
j. liu p. wu y. wang x. zhao sh. sun

virtual water adds a new dimension to crop trades and provides a new way of thinking about water scarcity. a systematic analysis of virtual water flows requires integration of all critical drivers of virtual water flows under a single consistent framework. the aim of this study was to assess virtual water flows related to trades of grain crops (wheat, corn, rice, and coarse cereals) and their i...

Journal: :international journal of group theory 0
tao zhao school of science, shandong university of technology qingliang zhang school of sciences, nantong university

suppose that $h$ is a subgroup of $g$‎, ‎then $h$ is said to be‎ ‎$s$-permutable in $g$‎, ‎if $h$ permutes with every sylow subgroup of‎ ‎$g$‎. ‎if $hp=ph$ hold for every sylow subgroup $p$ of $g$ with $(|p|‎, ‎|h|)=1$)‎, ‎then $h$ is called an $s$-semipermutable subgroup of $g$‎. ‎in this paper‎, ‎we say that $h$ is partially $s$-embedded in $g$ if‎ ‎$g$ has a normal subgroup $t$ such that $ht...

Journal: :isecure, the isc international journal of information security 0
e. aerabi m. kaykha m. fazeli a. patooghy a. akbari

embedded systems are becoming a suggestive target for code injection attacks in recent years. software protection mechanisms in general computers are not usually applicable in embedded systems as they come with limited resources like memory and processor. in this paper we investigate side channel characteristics of embedded systems and their usability in code injection attack detection. the arc...

Journal: :international journal of group theory 2013
tao zhao qingliang zhang

suppose that $h$ is a subgroup of $g$‎, ‎then $h$ is said to be‎ ‎$s$-permutable in $g$‎, ‎if $h$ permutes with every sylow subgroup of‎ ‎$g$‎. ‎if $hp=ph$ hold for every sylow subgroup $p$ of $g$ with $(|p|‎, ‎|h|)=1$)‎, ‎then $h$ is called an $s$-semipermutable subgroup of $g$‎. ‎in this paper‎, ‎we say that $h$ is partially $s$-embedded in $g$ if‎ ‎$g$ has a normal subgroup $t$ such that $ht...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده علوم پایه 1391

one of the applications of nanotechnology is use of carbon nanotubes for the targeted delivery of drug molecules. to demonstrate the physical and chemical properties of biomolecules and identify new material of drug properties, the interaction of carbon nanotubes (cnts) with biomolecules is a subject of many investigations. cnts is a synthetic compound with extraordinary mechanical, thermal, el...

Ali Akbar Ariamanesh Ali Akbar Jabbari,

English main-clause wh-questions form complementiser phrases with wh-words preposed to spec-C position. This is because English wh-words, as verb-complements originally, are strong enough to trigger wh-movement and auxiliary inversion. Persian EFL learners encounter an over-differentiation problem regarding the acquisition of auxiliary inversion rule in English standard questions. Once they hav...

ژورنال: مواد پرانرژی 2013

Abstract In this paper, production of a double base propellant grains embedded with continuous metal wires by the screw extruder is investigated. The factors effecting the burning rate of the grains are analyzed and selection of suitable metal wires are discussed. Also, manufactured propellants with embedded metal copper, brass and steel wires (diameter=0.25 mm) were tested by Crawford Bomb me...

Journal: :Semantics and Linguistic Theory 2019

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ریاضی 1391

در این پایان نامه مباحثی در مورد نیم گروه های معکوس توپولوژیکی اولیه (مطلقا) h-بسته و فشرده (شمارایی) بدست می آوریم و ساختار نیم گروه های معکوس توپولوژی فشرده شمارایی و نیم گروه های معکوس توپولوژی همنهشت-آزاد را توصیف می کنیم و نشان می دهیم که نیم گروه دو دوری نمی تواند در نیم گروه معکوس توپولوژی فشرده شمارایی نشانده شود. we present some discussions about compact (countably) and (absolutely) h...

A. Akbari A. Patooghy E. Aerabi M. Fazeli M. Kaykha

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید